Hash

Results: 3740



#Item
831Cryptographic hash functions / SHA-2 / ALGOL 68 / Program management / Ada / Construction / Computing / Software engineering / Programming language theory

CTC Financial Vote List 2.5 Highway Financial Matters March 26, 2015

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2015-03-30 14:06:57
832NoSQL / Structured storage / Search algorithms / Distributed computing architecture / Database management system / MongoDB / Consistent hashing / Hyperspace / Distributed hash table / Data management / Data / Computing

HyperDex: A Distributed, Searchable Key-Value Store Robert Escriva Bernard Wong Emin Gün Sirer

Add to Reading List

Source URL: hyperdex.org

Language: English - Date: 2013-09-30 21:44:12
833Information science / Computer performance / Hashing / Computer memory / Non-volatile memory / Solid-state drive / Hash table / IOPS / Bloom filter / Computing / Search algorithms / Computer hardware

Design Patterns for Tunable and Efficient SSD-based Indexes Ashok Anand† , Aaron Gember-Jacobson*, Collin Engstrom*, Aditya Akella* † Instart Logic *University of Wisconsin-Madison †

Add to Reading List

Source URL: agember.com

Language: English - Date: 2014-10-21 17:08:21
834Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
835Cycling in Canada / Parks in Windsor /  Ontario

MBC Bike Month 2015 Events for May ALL MONTH: #LeftTheCarAtHome: Replace 20 car trips in May with Cycling trips! Commute, work/meetings, or errands. Use the hash tag above with #BikeMontgomery, take at photo at your dest

Add to Reading List

Source URL: www.mgmbikeclub.org

Language: English - Date: 2015-05-02 15:42:26
836

BREAKFAST ALL SCRAMBLERS & OMELETS SERVED WITH HASH BROWNS & CHOICE OF TOAST SALAD OR A SIDE OF TOMATO MAY BE SUBSTITUTED FOR HASH BROWNS *EACH ADDITIONAL MEATEACH ADDITIONAL VEGETABLE 1.00

Add to Reading List

Source URL: www.toasteatery.com

Language: English - Date: 2014-04-08 19:43:02
    837Computer architecture / GPGPU / Stream processing / Stream / Supercomputer / Hash function / Computing / Concurrent computing / Computer programming

    Automated Reliability Classification of Queueing Models for Streaming Computation Jonathan Beard, Cooper Epstein, and Roger Chamberlain

    Add to Reading List

    Source URL: icpe2015.ipd.kit.edu

    Language: English - Date: 2015-02-07 13:27:16
    838Distributed data storage / File sharing networks / File sharing / Peer-to-peer computing / Distributed algorithms / Peer-to-peer / Social peer-to-peer processes / HTTP / Distributed hash table / Concurrent computing / Computing / Distributed computing

    On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar School of Computer and Communication Sciences Ecole Polytechnique F´ed´erale de Lausanne (EPFL) CH-1015 Lausanne, Switzerland Abstract

    Add to Reading List

    Source URL: lsirpeople.epfl.ch

    Language: English - Date: 2005-05-09 08:09:00
    839Internet protocols / Secure communication / Cryptographic protocols / Cryptographic hash functions / Cipher suite / SHA-2 / Transport Layer Security / RC4 / OpenSSL / Cryptography / Cryptographic software / Computing

    Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung Why Android SSL was dow

    Add to Reading List

    Source URL: www.sicherheitsforschung-magdeburg.de

    Language: English - Date: 2013-12-11 11:42:27
    840Hashing / Cryptographic hash functions / Advanced Encryption Standard / HMAC / FIPS 140-2 / SHA-2 / SHA-1 / FIPS 140 / OpenSSL / Cryptography / Cryptography standards / Cryptographic software

    Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-05-21 15:50:50
    UPDATE